ManageEngine Recognized in the 2018 Gartner MQ for Security Information and Event Management
January 10, 2019
Share this

ManageEngine has been positioned in the Gartner 2018 Magic Quadrant for Security Information and Event Managementi (SIEM).

This is the third consecutive year that ManageEngine's SIEM solution, Log360, has been named in this report. A complimentary copy of the complete report is available at www.manageengine.com/log-management/gartner-siem-mq.html.

More enterprises than ever are jumping on the cloud bandwagon, as cloud services offer the speed and agility that's required to meet business goals efficiently. However, ensuring security for cloud and hybrid environments is still a challenge for many enterprises. SIEM solutions simplify this task by offering enterprises comprehensive security features for their IT environments from a single console.

"We at ManageEngine are focused on building a future-oriented, comprehensive yet simple-to-use SIEM solution that will meet the rapidly growing demands of enterprise security," said Manikandan Thangarajan, Director of Product Management at ManageEngine. "We want to equip contemporary and future SOCs with the ability to detect, respond to and mitigate sophisticated attacks with an advanced threat intelligence platform as well as seamlessly orchestrate security operations across on-premises, cloud and hybrid platforms. We believe Gartner's recognition is honoring our efforts on this constant evolution."
Highlights of Log360

Log360, ManageEngine's exhaustive yet easy-to-use SIEM solution, helps enterprises ensure security across on-premises and cloud environments. Log360's critical functions include its ability to be quickly deployed; capability to automatically discover and configure Windows infrastructure, network devices, and SQL databases for monitoring; ability to capture information using various methods; and use of automatic parsing.

In addition to being positioned in the Magic Quadrant for SIEM, Gartner also named ManageEngine (Log360) in its 2018 Critical Capabilities for Security Information and Event Managementi report, which extends the Magic Quadrant analysis for deeper insights into providers' product and service offerings.

Log360 features include:

- Support for cloud monitoring: Analyze and detect suspicious events in IaaS platforms such as Amazon Web Services (AWS) and Azure in addition to SaaS applications such as Salesforce.

- Security auditing of physical and virtual infrastructures: Audit volumes of log data generated by various sources - including Windows and Linux servers, EMC and NetApp file servers, Active Directory environments, and VMware and Hyper-V machines - and turn that data into actionable insights.

- Intuitive and real-time security analytics: Use over 1,000 prepackaged report templates, interactive dashboards, and alert profiles, all of which cover the basic security, auditing and compliance needs of most enterprises. These components provide immediate insight into suspicious events and facilitate quick decision-making.

- Advanced threat detection: Detect malicious traffic in the network and stop potential network intrusions at their earliest stages thanks to STIX/TAXII threat feed processors and a global IP threat database. Log360's real-time correlation engine can detect indicators of compromise and attacks across different resources in a network to help preempt security threats.

- User behavior analytics: Deter insider attacks thanks to the Log360 user behavior analytics module, which is powered by machine learning. It quickly spots user behavior anomalies such as abnormal user logons, logon failures, unusual user accesses to critical resources, and more.

- Streamlined incident management system: Track the resolution of detected incidents and ensure accountability in the incident resolving process with Log360's built-in incident management module. This module also supports raising tickets in help desk software - such as ServiceNow, ManageEngine ServiceDesk Plus, JIRA, Zendesk and more - for every threat detected in the network.

Share this

The Latest

August 19, 2019

One common infrastructure challenge arises with virtual private networks (VPNs). VPNs have long been relied upon to deliver the network connectivity and security enterprises required at a price they could afford. Organizations still routinely turn to them to provide internal and trusted third-parties with "secure" remote access to isolated networks. However, with the rise in mobile, IoT, multi- and hybrid-cloud, as well as edge computing, traditional enterprise perimeters are extending and becoming blurred ...

August 15, 2019

The configuration management database (CMDB), along with its more federated companion, the configuration management system (CMS), has been bathed in a deluge of negative opinions from all fronts — industry experts, vendors, and IT professionals. But from what recent EMA research on analytics, ITSM performance and other areas is indicating, those negative views seem to be missing out on a real undercurrent of truth — that CMDB/CMS alignments, whatever their defects, strongly skew to success in terms of overall IT progressiveness and effectiveness ...

August 14, 2019

The on-demand economy has transformed the way we move around, eat, learn, travel and connect at a massive scale. However, with disruption and big aspirations comes big, complex challenges. To take these challenges head-on, on-demand economy companies are finding new ways to deliver their services and products to an audience with ever-increasing expectations, and that's what we'll look at in this blog ...

August 13, 2019

To thrive in today's highly competitive digital business landscape, organizations must harness their "digital DNA." In other words, they need to connect all of their systems and databases — including various business applications, devices, big data and any instances of IoT and hybrid cloud environments — so they're accessible and actionable. By integrating all existing components and new technologies, organizations can gain a comprehensive, trusted view of their business functions, thereby enabling more agile deployment processes and ensuring scalable growth and relevance over the long-term ...

August 12, 2019

Advancements in technology innovation are happening so quickly, the decision of where and when to transform can be a moving target for businesses. When done well, digital transformation improves the customer experience while optimizing operational efficiency. To get there, enterprises must encourage experimentation to overcome organizational obstacles. In other words ...

August 08, 2019

IoT adoption is growing rapidly, and respondents believe 30% of their company’s revenue two years from now will be due to IoT, according to the new IoT Signals report from Microsoft Corp ...

August 07, 2019

It's been all over the news the last few months. After two fatal crashes, Boeing was forced to ground its 737. The doomed model is now undergoing extensive testing to get it back into service and production. Large organizations often tell stakeholders that even though all software goes through extensive testing, this type of thing “just happens.” But that is exactly the problem. While the human component of application development and testing won't go away, it can be eased and supplemented by far more efficient and automated methods to proactively determine software health and identify flaws ...

August 06, 2019

Despite significant investment in AI, many companies are still struggling to stabilize and scale their AI initiatives, according to State of Development and Operations of AI Applications 2019 from Dotscience ...

August 05, 2019

IT has two principal functions: create a network that satisfies the business needs of the company and then optimize that network. Unfortunately, the modern enterprise is buried under a myriad of network improvement projects that often do not get deployed ...

August 01, 2019

Even large companies are not yet realizing the potential of digital transformation, according to a new study from Cherwell Software, The Power of Process Integration in the Information Age ...